From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

A couple of weeks ago, I was having lunch with a long-time CISO. We were chatting about the state of our industry when the topic landed on APTs. My friend asked, “This is 2013…should we still care about APTs?”

Typically when companies get breached, they call us out for help. We have a team that can fly to any part of the world from China to Washington, D.C with our security software and appliances. Most companies have started seeing the sources and data transfers within the first hour of our assistance .

In today's blog I want to take a look at these companies and examine what they did after the data breach.

Executives representing HP Enterprise Security Products, a large security group within HP Software, will be delivering presentations on the key trends and tactices to combat APTs, insider threats, and malwares from affecting your critical infrastructure and data for the year 2014 and after.

HP Protect'13, a user security conference in Washington, D.C that runs from Sept 16-19, will have 20+ customer presentations and keynotes that will give you an outside perspective on challenges that these companies are facing and how to combat the same problems and adversaries that everyone is fighting to keep them out.

This list, compiled by Ronald Madamba, talks about the key topics and issues that will be addressed in three primary focus areas of security: information security, application security and network security

Make the most out of the HP Protect 2014 event with our packed agenda. Mix the right amount of business and pleasure to ensure that you relax, enjoy, and learn at the same time. Starting with deep-dive technical sessions, keynotes, to chat with product managers, product developers, to your support buddies are all at the event and make sure you are tuned in with your team to ensure you get personal nurture.

Select you’re Bar of choice – With an informative Guru bar, support bar, education bar, and service bar at HP Protect 20134 attendees have the opportunity to find answers, ask questions, learn, and apply their knowledge after hours of training.

Food for thought – At HP Protect 2013 we’re offering daily breakfast and lunch which gives attendees the opportunity to connect with their peers and share thoughts, all while fueling up for the day.

The National Initiative for Cybersecurity Education (NICE) has developed the National Cybersecurity Workforce Framework (“the Framework”) to provide a common understanding of and lexicon for cybersecurity work, according to their website http://csrc.nist.gov/nice/framework/.

This framework work spans across the industries, job titles and verticals. This is also independent of size because one person may perform multiple roles or many people can perform single role depending on the size of the organization.

When you look into the cubicle next to you, what do you see? Do you see Joe, the guy you go grab beers with or do you see a malicious insider? Because Joe does not wear his villain mask and “evil-doer” cape, you may never know his current status.

Keep reading to find out how you can easily determine what Joe’s motives are by his activities within the system.

Intelligence has a long history of providing pivotal information to decision-makers. Many have proposed that we must apply this concept of intelligence to information security and the struggle against the threat landscape. Without intelligence, we cannot proactively protect against attacks or potential attacks, mainly because we don’t understand the motivations and what’s behind them. One source of attacks, out of many, is the human intention or behavior of internal employee oreven an outsider to the company.

Big Data is a fascinating wave. Big Data Security Analytics is a specialized application of Big Data technology to security. Big Data Security Analytics (BDSA) is the subject of exuberant predictions. Some people even claim it will replace SIEM.